Alert button
Picture for Konstantin Berlin

Konstantin Berlin

Alert button

Web Content Filtering through knowledge distillation of Large Language Models

Add code
Bookmark button
Alert button
May 10, 2023
Tamás Vörös, Sean Paul Bergeron, Konstantin Berlin

Figure 1 for Web Content Filtering through knowledge distillation of Large Language Models
Figure 2 for Web Content Filtering through knowledge distillation of Large Language Models
Figure 3 for Web Content Filtering through knowledge distillation of Large Language Models
Figure 4 for Web Content Filtering through knowledge distillation of Large Language Models
Viaarxiv icon

That Escalated Quickly: An ML Framework for Alert Prioritization

Add code
Bookmark button
Alert button
Feb 15, 2023
Ben Gelman, Salma Taoufiq, Tamás Vörös, Konstantin Berlin

Figure 1 for That Escalated Quickly: An ML Framework for Alert Prioritization
Figure 2 for That Escalated Quickly: An ML Framework for Alert Prioritization
Figure 3 for That Escalated Quickly: An ML Framework for Alert Prioritization
Figure 4 for That Escalated Quickly: An ML Framework for Alert Prioritization
Viaarxiv icon

AI Total: Analyzing Security ML Models with Imperfect Data in Production

Add code
Bookmark button
Alert button
Oct 13, 2021
Awalin Sopan, Konstantin Berlin

Figure 1 for AI Total: Analyzing Security ML Models with Imperfect Data in Production
Figure 2 for AI Total: Analyzing Security ML Models with Imperfect Data in Production
Figure 3 for AI Total: Analyzing Security ML Models with Imperfect Data in Production
Viaarxiv icon

A Simple and Agile Cloud Infrastructure to Support Cybersecurity Oriented Machine Learning Workflows

Add code
Bookmark button
Alert button
Feb 26, 2020
Konstantin Berlin, Ajay Lakshminarayanarao

Figure 1 for A Simple and Agile Cloud Infrastructure to Support Cybersecurity Oriented Machine Learning Workflows
Viaarxiv icon

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Add code
Bookmark button
Alert button
May 16, 2019
Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin

Figure 1 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Figure 2 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Figure 3 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Figure 4 for Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection
Viaarxiv icon

SMART: Semantic Malware Attribute Relevance Tagging

Add code
Bookmark button
Alert button
May 15, 2019
Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin

Figure 1 for SMART: Semantic Malware Attribute Relevance Tagging
Figure 2 for SMART: Semantic Malware Attribute Relevance Tagging
Figure 3 for SMART: Semantic Malware Attribute Relevance Tagging
Figure 4 for SMART: Semantic Malware Attribute Relevance Tagging
Viaarxiv icon

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Add code
Bookmark button
Alert button
Mar 13, 2019
Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang

Figure 1 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 2 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 3 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Figure 4 for ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
Viaarxiv icon

eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys

Add code
Bookmark button
Alert button
Feb 27, 2017
Joshua Saxe, Konstantin Berlin

Figure 1 for eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
Figure 2 for eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
Figure 3 for eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
Figure 4 for eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys
Viaarxiv icon